Japan warns of malicious PyPi packages created by North Korean hackers

Japan warns of malicious PyPi packages created by North Korean hackers

February 28, 2024 at 10:08AM

JPCERT/CC warns of North Korean hacker group Lazarus uploading four malicious PyPI packages to infect developers with malware. These packages allow access to developer networks, enabling financial fraud and supply chain attacks. The malware, named “Comebacker,” connects to the attacker’s server and executes further Windows malware. Previous attacks by Lazarus targeted cryptocurrency-related entities.

Based on the meeting notes, it is clear that Japan’s Computer Security Incident Response Team (JPCERT/CC) has issued a warning about the North Korean hacking group Lazarus uploading four malicious packages to PyPI to infect developers with malware. These packages were designed to install the ‘Comebacker’ malware loader and were disguised as legitimate ‘pycrypto’ project packages. Despite being removed from PyPI, these packages had already compromised thousands of systems before their removal. The Comebacker malware connects to the attacker’s command and control (C2) server and has been used in previous attacks, indicating a sustained campaign by Lazarus. Additionally, it is reported that Lazarus has a history of breaching corporate networks for financial fraud, including cryptocurrency thefts from various platforms. GitHub has also issued a warning about Lazarus targeting developers in specific industries such as blockchain, cryptocurrency, online gambling, and cybersecurity companies using malicious repositories.

If you need further analysis or specific action points from these meeting notes, please let me know how I can assist you.

Full Article